2017
DOI: 10.1109/thms.2016.2611822
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Biometric and Interaction Performance Assessment of Automated Border Control Processes

Abstract: Abstract-Automated Border Control (ABC) in airports and land crossings utilise automated technology to verify passenger identity claims. Accuracy, interaction stability, user error and the need for a harmonised approach to implementation is required. Two models proposed in this paper establish a global path through ABC processes. The first, the Generic Model, maps separately the enrolment and verification phases of an ABC scenario. This allows a standardisation of the process and an exploration of variances an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 17 publications
0
14
0
Order By: Relevance
“…Though there are several works on usability in biometrics, such as [ 5 ]–[ 7 ], there are only a few previous works in the area, as accessibility has not still gained too much attention in biometric recognition systems [ 8 ]. Previous studies highlight the main difficulties that people with accessibility concerns may face when interacting with biometrics [ 3 ].…”
Section: State Of the Artmentioning
confidence: 99%
“…Though there are several works on usability in biometrics, such as [ 5 ]–[ 7 ], there are only a few previous works in the area, as accessibility has not still gained too much attention in biometric recognition systems [ 8 ]. Previous studies highlight the main difficulties that people with accessibility concerns may face when interacting with biometrics [ 3 ].…”
Section: State Of the Artmentioning
confidence: 99%
“…Sources of information can have dual or multiple roles over the states. 2) Time limits of the operations place certain constraints on the sytem performance [28], [31], [45]. An example is a security problem known as the "bottleneck" and "traveler redress".…”
Section: Basic Definitions Statements and Propertiesmentioning
confidence: 99%
“…The future generation security checkpoint for mass-transit hubs and large public events is anticipated to be a system that combines: biometric-enabled authentication [12], [19], [31], [45] and watchlist check [32], screening strategies [37], deception feature detection [1], [41], [43], [55], as well as concealed illicit item detection [38], [53]. Such a system will be an integral part of the security infrastructure, including logistics and surveillance network with abilities of tracking individuals-of-interest and analyzing the group behavior.…”
Section: Introductionmentioning
confidence: 99%
“…There has been some research in the past to analyze those factors between the user and the biometric sensor in general [76], including specific models to analyze and exploit the interaction between the user and the biometric sensor [77]. More recently, we can see some targeted studies towards understanding the interaction between users and technology for key biometric end applications like border control [78], or smartphone unlock [79].…”
Section: Challenges In Biometrics: Role Of Mcsmentioning
confidence: 99%